General

  • Target

    2376-11-0x0000000000400000-0x0000000000442000-memory.dmp

  • Size

    264KB

  • MD5

    c9bc497eb7653b1ca3a13ca8977166a2

  • SHA1

    384c58baa756f185deb40afd8a8a44bd6b5146bd

  • SHA256

    51f3903a16932ba59a337b45b264475d4301d6f93086d889c6b72cae6c109977

  • SHA512

    b7aee99c3da3da421f9a51ea1cdf4f3abc6308733b771e9e0a735fac77194380b9a38476b0ec48a33d9de82c3e827e675e2c4970a36c296e9972f49bdda5a4f0

  • SSDEEP

    3072:AxydbqayiqP0KJEfC+w99dTHo9rG8KaG5jnTqtSjufzz:1xqayiq8T0lsq8KaWT6

Score
10/10

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    4r@d15PS!-!h

Signatures

  • Agenttesla family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2376-11-0x0000000000400000-0x0000000000442000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections